Free CompTIA CAS-004 Exam Questions (page: 25)

A review of the past year's attack patterns shows that attackers stopped reconnaissance after finding a susceptible system to compromise. The company would like to find a way to use this information to protect the environment while still gaining valuable attack information.
Which of the following would be BEST for the company to implement?

  1. A WAF
  2. An IDS
  3. A SIEM
  4. A honeypot

Answer(s): D


Reference:

https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot



A security architect is reviewing the following proposed corporate firewall architecture and configuration:
Both firewalls are stateful and provide Layer 7 filtering and routing. The company has the following requirements:
-Web servers must receive all updates via HTTP/S from the corporate network.
Web servers should not initiate communication with the Internet.
-Web servers should only connect to preapproved corporate database servers.
-Employees' computing devices should only connect to web services over ports 80 and 443.
Which of the following should the architect recommend to ensure all requirements are met in the MOST secure manner? (Choose two.)

  1. Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP 80,443
  2. Add the following to Firewall_A: 15 PERMIT FROM 192.168.1.0/24 TO 0.0.0.0 TCP 80,443
  3. Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP/UDP 0-65535
  4. Add the following to Firewall_B: 15 PERMIT FROM 0.0.0.0/0 TO 10.0.0.0/16 TCP/UDP 0-65535
  5. Add the following to Firewall_B: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0 TCP/UDP 0-65535
  6. Add the following to Firewall_B: 15 PERMIT FROM 192.168.1.0/24 TO 10.0.2.10/32 TCP 80,443

Answer(s): A,F



As part of the customer registration process to access a new bank account, customers are required to upload a number of documents, including their passports and driver's licenses. The process also requires customers to take a current photo of themselves to be compared against provided documentation.
Which of the following BEST describes this process?

  1. Deepfake
  2. Know your customer
  3. Identity proofing
  4. Passwordless

Answer(s): C


Reference:

https://auth0.com/blog/what-is-identity-proofing-and-why-does-it-matter/



A user from the sales department opened a suspicious file attachment. The sales department then contacted the SOC to investigate a number of unresponsive systems, and the team successfully identified the file and the origin of the attack.
Which of the following is the NEXT step of the incident response plan?

  1. Remediation
  2. Containment
  3. Response
  4. Recovery

Answer(s): B


Reference:

https://www.sciencedirect.com/topics/computer-science/containment-strategy



Viewing page 25 of 159



Post your Comments and Discuss CompTIA CAS-004 exam prep with other Community members:

CAS-004 Exam Discussions & Posts